General
-
Target
f31254dd9f97140968580095fe05f182ce5539fdeb98c5c724685f675eb779f4
-
Size
960KB
-
Sample
230320-sayxraga8z
-
MD5
0d5c4ef97d41a922841f50a078b2cc63
-
SHA1
5822368adfbb67983a31ea1b54f4738a97b0ed03
-
SHA256
f31254dd9f97140968580095fe05f182ce5539fdeb98c5c724685f675eb779f4
-
SHA512
e378fbbf098b44cbd76f3665a66b4c8a7eed7b9a54140f34a0662029d2d8bc7e899c659ef5e636fad3e019ca06511bba2761c221cdc50ec96e430cb79390bd9d
-
SSDEEP
24576:dysMod7yUmzk/00GH0jbJpYF6ZuzKnrbRy579nujG4pdyti:4Xcy3oyOQVzyNitVt
Static task
static1
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
f31254dd9f97140968580095fe05f182ce5539fdeb98c5c724685f675eb779f4
-
Size
960KB
-
MD5
0d5c4ef97d41a922841f50a078b2cc63
-
SHA1
5822368adfbb67983a31ea1b54f4738a97b0ed03
-
SHA256
f31254dd9f97140968580095fe05f182ce5539fdeb98c5c724685f675eb779f4
-
SHA512
e378fbbf098b44cbd76f3665a66b4c8a7eed7b9a54140f34a0662029d2d8bc7e899c659ef5e636fad3e019ca06511bba2761c221cdc50ec96e430cb79390bd9d
-
SSDEEP
24576:dysMod7yUmzk/00GH0jbJpYF6ZuzKnrbRy579nujG4pdyti:4Xcy3oyOQVzyNitVt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-